L. Wu, M. Grace, Y. Zhou, C. Wu, and X. Jiang, The impact of vendor customizations on android security, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.623-634, 2013.
DOI : 10.1145/2508859.2516728

T. Specification and G. Terminals, AT command set for 3GPP User Equipment (UE), pp.17-18, 1999.

C. Mulliner, S. Liebergeld, M. Lange, and J. Seifert, Taming Mr Hayes: Mitigating signaling based attacks on smartphones, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), pp.1-12, 2012.
DOI : 10.1109/DSN.2012.6263943

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.676.7275

A. J. Singh and A. Bhardwaj, Android Internals and Telephony, Int. J. Emerg. Technol. Adv. Eng, vol.4, pp.51-59, 2014.

H. Module, Android RIL Integration Guide-Huawei, 2014.

T. Vidas, E. C. Cylab, D. Votipka, I. N. Cylab, and N. Christin, All Your Droid Are Belong To Us : A Survey of Current Android Attacks, WOOT, 2011.

C. Impactor, pywinauto -Windows GUI automation using Python -Google Project Hosting, https://code.google.com

A. Hoog, Android Forensics: Investigation, Analysis and Mobile Security for Google Android, 2011.

M. Gargenta, Learning Android, 2011.